Static task
static1
Behavioral task
behavioral1
Sample
NEAS.42bf23ab81be2655e168799145ac0ba0.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
NEAS.42bf23ab81be2655e168799145ac0ba0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.42bf23ab81be2655e168799145ac0ba0.exe
-
Size
126KB
-
MD5
42bf23ab81be2655e168799145ac0ba0
-
SHA1
2d955f6dfe3f8616d4002ffee085a41625bf0f6f
-
SHA256
9b86ab8e3767ec94942d920fb5148712f5879f932da9ed8fba8b93ca648dedf0
-
SHA512
babd72f744e7ddc4aa23093e3f7ec93f726e8519e3286d85a7614c8bcc06f57de8762c781b3593585e6ee05f83cc58b8d22310e24115eaf0b74bb9e6bf1d54cb
-
SSDEEP
3072:9kp+adPrfR7rd3g7yZV5yh+17P4lNGt7t:aksPN2ujUhAzntt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource NEAS.42bf23ab81be2655e168799145ac0ba0.exe
Files
-
NEAS.42bf23ab81be2655e168799145ac0ba0.exe.exe windows:6 windows x86
768ba7003c960a3b8411306063a0bb91
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
dolphinosk
Create_Dolphin_Keyboard
d2d1
ord1
kernel32
CreateFileW
FlushFileBuffers
GetCommandLineW
HeapSetInformation
OutputDebugStringW
Sleep
Beep
WriteConsoleW
SetStdHandle
LoadLibraryW
HeapReAlloc
LoadLibraryExW
RtlUnwind
LCMapStringW
GetStringTypeW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetStartupInfoW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetFileType
EncodePointer
DecodePointer
GetCommandLineA
IsDebuggerPresent
IsProcessorFeaturePresent
InterlockedIncrement
InterlockedDecrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetLastError
SetLastError
GetCurrentThreadId
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
ExitProcess
GetModuleHandleExW
GetProcAddress
HeapSize
GetStdHandle
WriteFile
GetModuleFileNameW
HeapFree
HeapAlloc
RaiseException
GetProcessHeap
CloseHandle
user32
RegisterWindowMessageW
PostMessageW
FindWindowW
EndPaint
ScreenToClient
GetWindowRect
GetMessageW
PostQuitMessage
SetCapture
LoadCursorW
CallNextHookEx
GetClientRect
BeginPaint
TranslateMessage
RegisterClassExW
LoadIconW
RegisterTouchWindow
InvalidateRect
GetWindowLongW
EnableMouseInPointer
PeekMessageW
SetWindowLongW
GetDesktopWindow
SetWindowPos
ShowWindow
CreateWindowExW
SetWindowsHookExW
UnhookWindowsHookEx
ReleaseCapture
IsWindowVisible
SendMessageW
UpdateWindow
ValidateRect
DefWindowProcW
DispatchMessageW
shell32
Shell_NotifyIconW
CommandLineToArgvW
ole32
CoCreateInstance
CoInitialize
CoUninitialize
Sections
.text Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ